Network Protocols for Applications of Shared Virtual Reality

Size: px
Start display at page:

Download "Network Protocols for Applications of Shared Virtual Reality"

Transcription

1 Network Protocols for Applications of Shared Virtual Reality Jiri Hnidek Technical University of Liberec Studentska 2 Czech Republic , Liberec jiri.hnidek@tul.cz ABSTRACT Files are usually used for exchange of 3D data between graphical applications, but this approach is not feasible for applications of shared virtual reality. Thus a network protocol is used for this purpose. Two antithetical requirements are claimed for such protocol. Protocol has to be partially or completely reliable. Neither delay jitter nor too high delay are acceptable. This paper explains and analyzes new version of protocol called Verse. This improves shortcomings found in UDP, TCP, SCTP and DCCP transport protocols. The Verse protocol was designed for sharing 3D data between applications of shared virtual reality. This paper also contains results of experiments comparing suitability of network protocols for application of shared virtual reality. Keywords Shared Virtual Reality, Network Protocol, Transport Protocol, Delay, Delay Jitter, Verse 1. INTRODUCTION Applications of shared virtual reality (ASVR) require transferring of information (e.g. position of avatar [KCJ0]) with small delay and delay jitter, because flickering of object motion is disruptive for an observer of virtual reality. Let consider situation, when users of ASVR cooperate in this environment and try to create large scene (e.g. city with buildings ). When users create these objects, then movements of all entities (objects, vertexes) is unpredictable. Each user should see what other users are doing in real-time and movement of shared entities should be smooth as much as possible. Many users of ASVR can create large traffic. Moreover some activities of users can cause burst traffic (uploading of existing object, sculpt painting, etc.). UDP protocol is usually used for sending real-time data. On the contrary TCP is usually used for transferring static 3D data, because it is reliable stream protocol. When users of ASVR want to edit shared geometry and topology of 3D objects, then partial reliability as well as low latency is required. Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. It will be proved that any transport protocols as is can not meet those needs. It will be shown that new Verse protocol can effectively meet both needs. 2. CONDITIONS OF EXPERIMENTS A special client-server application was developed for testing all above network protocols (Fig. 9). Network protocols were tested in real network environments, but comparison of protocols required different approach. Figure 1. Each operating system had TBF engress qdisc and Netem ingress qdisc. Connection of Netem and TBF qdisc allowed to simulate real network conditions. It was necessary to set exact parameters of link between client and server applications for tested protocols. For this reason the server application run on virtualized Linux operating system and the client application run on host. Virtual link between host and virtualized OS was modified with Linux traffic WSCG 2011 Communication Papers 31

2 control to simulate real network conditions. The Netem [Hem05] queueing disciple (qdisc) was used for setting delay and delay jitter. The TBF qdisc was used for setting limited bandwidth. It is important to note, that unmodified link between host and virtualized OS had delay 0.5 ms and average delay jitter was 0.03 ms. Configured values of delay and delay jitter were 10 times higher than values on unmodified link. This delay simulated local are network. The bandwidth of the link was limited using TBF qdisc to 256 kb/s. The MTU of link was 1500 B. 3. METHODS OF EXPERIMENTS Particle system was used to simulate wide range of users working with 3D data. Two particle systems were pre-generated. The particle system containing 100 particles was used for testing network protocols at modified virtual link, because it generated decent traffic and visualization. The particles system with 1000 particles was tested in real network environment. The particle system is simple simulation of bouncing balls, but it is assumed that movement of particles simulates some type of unpredictable movement and thus only position of particles was sent through network. Graph at Fig. 2 shows time slope of particles in scene. Figure 2. Time slope of particles in scene. Duration of pre-generated particle system was 8 seconds using 25 frames per seconds (FPS). The particle systems were generated with 25 frames per second (FPS). The illusion of slow motion depends on many factors (resolution, distance of user from the screen, etc.). In the worst case this illusion is broken, when delay of received particle is longer then 40 ms. Such particle is visualized as problematic delay. The main communication between client and server is started by client application by a request to send particles. When server receives client request, then it starts to send positions of all moving particles every 40 milliseconds back to the client. The PMTU is used during this simple handshake to discover maximal size of packet. The position of each moving particle is added to the packet in a simple message containing particle id, frame number and vector of position. When there are no other particles that could be added to the packet or packet is full, then packet is send to the client. The client application tries to receive packets with positions of particles and it visualizes differences between received and pregenerated particle system. First 10 received blind packets are used to compute average delay between client and server before real data transfer. 4. TESTING OF TRANSPORT NETWORK PROTOCOLS UDP and TCP UDP [Pos80] was the first tested protocol. UDP is unreliable datagram protocol widely used in gaming applications for its low latency. UDP is not congestion aware and generated traffic can cause congestion collapse. We can see at Fig 4 that particles transported with UDP had low delays except the period, when congestion occurred. Average delay was bigger than 40 milliseconds and packet loss was visually noticeable during connection. On the other hand tests proved that using pure UDP in ASVR is not feasible, because lost data are not resent and it leads to inconsistency of shared data in ASVR. UDP protocol could be used for ASVR, but re-sending of lost packets has to be solved at the application layer. Contrary TCP protocol [Pos81] is not widely used in gaming applications, because of the consequences of its reliability mechanism. When one single packet is lost, then proceeding of all following packets is blocked until the lost packet is resent as we can see at Fig 5. Such behavior lead to a sudden stop of motion and high delay up to 1 second. Tests of TCP protocol proved that using TCP in ASVR is possible only in situations where bandwidth is bigger than the highest generated bitrate, there are no other concurrent transmission and RTT is much smaller than 1/FPS. It is usually not possible to guarantee such conditions in real networks and thus retransmission of lost data leads to very big delays. Al-Regib and Altunbasak proved in [ARA04], that combination of UDP and TCP connection can be effectively used for streaming of large 3D data sets. This approach can be also used in ASVR for loading large data sets, but it does not solve all specific problems of ASVR, where many users share the same 3D data set. We can see at Fig. 4 and Fig. 5 that tests of UDP and TCP protocols on real network produced similar results as tests at modified virtual link. SCTP SCTP [Ste07] is a modern message based transport protocol. It can act as reliable or partially reliable protocol. SCTP does not provide reliable order delivery, because it is based on message. When reliable variant of SCTP is used, then there is no need to wait for re-transmission of previous lost packets. This feature could be considered as great WSCG 2011 Communication Papers 32

3 benefit for ASVR, because there is smaller average delay of received particles. On the other hand this caused flickering of received particles. Someone can argue that this is visually more confusing than big delays of TCP. Flickering could be theoretically removed by adding a time stamp to each message, but re-transmission of obsolete particle position is not effective approach. Every re-transmission of obsolete particle position makes congestion worse. We can see at Fig. 6 that average delay of reliable variant of SCTP is bigger than average delay of TCP. Partial reliable variant of SCTP can specify time to live (TTL) of each message. It means that sender tries to re-transmit lost message only for specified time. When the TTL of message is reached, then unsent message is dropped. Partially reliable variant of SCTP removed flickering of received particles, when TTL was smaller then 0.5/FPS, but important feature of reliability was lost. Using partially reliable variant of SCTP in ASVR is not acceptable for the same reason as pure UDP protocol. The results of tests (Fig. 7) gave similar result as test of UDP protocol. DCCP DCCP [KHF06] is a congestion friendly unreliable datagram protocol. Congestion control of DCCP protocol should be better than congestion control implemented at application layer on top of UDP, because DCCP can send ECN capable packet that helps to detect congestion without dropping packets. Tests of DCCP protocol proved that implementation of this protocol in Linux is not ready yet for practical deployment. When some error occurs (e.g. many packets loss), then memory of machine can go out of the limit [LF09]. Thus results of DCCP test were not comparable with tests of other transport protocols. 5. VERSE PROTOCOL All tested transport protocol failed in some way. Unreliable or partially reliable protocols do not resend lost packets. Reliable protocols try to resend all lost data and it causes high delays. Verse protocol uses different approach, because it tries to resend only actual data and obsolete data are dropped. Verse protocol [BSS06] [SB07] is an application protocol designed for sharing 3D data in ASVR. It uses UDP protocol as a transport layer. UDP it is widely used datagram protocol and it allows implementation of own effective resend mechanism at application layer. Principles of Verse Protocol The Verse protocol uses client-server architecture. It means the Verse server holds data and distributes changes of shared data between connected clients. For example, when a client sends a message containing new position of the object to the server, then server changes local position of the object and re-transmits this change to all clients interested in this object. From this point of view the Verse protocol behaves like a network protocol used in gaming applications [WCC+09]. The Verse protocol allows much more. Applications can share not only the object transformations but also geometry and topology of objects, materials, textures, UV coordinates etc. On the other side, the Verse protocol does not allow to use multicast connections because each client is interested in different set of objects. Resend Mechanism of Verse Protocol Basic principles of resend mechanism will be described on the example (Figure. 3). It is assumed, that the Verse packet with ID = 31 contained information about object position. This packet was sent from the sender to the receiver. The receiver received this packet and sent the acknowledgment packet back to the sender. The sender could be client and receiver could be server and vice versa. After a while the sender sent new packet. This packet had ID = 32 and contained new position of the object. This packet was lost. The receiver detected this loss, when the packet with ID = 33 was received, because the receiver expected packet with ID = 32. After this, the receiver sent acknowledgment containing information about reception of packet 33 and loss of the packet 32. The next method of detection of packet loss is detection by sender using timeouts. Figure 3. Example of simplified Verse resend mechanism. Each packet sent from the sender has unique ID and it contains position of sphere object. Acknowledgment packet sent from the receiver to the sender contains positive or negative acknowledgment of received packet. Let's assume, that this acknowledgment was received by the sender. How the sender processed this acknowledgment? If the sender resent content of the lost packet 32, then the receiver would receive obsolete position of the object and it would lead to inconsistency of shared data. On the other side the lost packet could contain some useful and still valid information (for example, information about position WSCG 2011 Communication Papers 33

4 of some other object, command to delete an object etc.). Therefor sender must pick non-obsolete data from lost packet and pack them to a new packet. It is important to note, that the most of packet loss is caused by congestion in the network. Because network equipments try to use fair scheduling for data flows, then most of congestion is caused by traffic from the sender. Thus most of the packet loss could be effectively detected by methods described above. If packet loss was detected only by sender using timeout, then this behavior would lead to high delays. Let's consider that retransmission timeout interval (RTO) is computed using the following formulas. Smoothed RTT (SRTT) is computed with: RTT 1 SRTT SRTT (1) where RTT is round trip time measurement from the most recently acknowledged payload packet. The RTO is then: RTO= SRTT (2) Suggested value of constant α is 0.9 and suggested value of constant β is 2. RTT of packet could be in range of ms in real network environment. If SRTT is 10 ms, then not-lost packets are delivered with average delay 5 ms and lost packet would be delivered with average delay 25 ms. Proposed approach used in Verse protocol allows to deliver lost packet with average delay 15 ms. If 3D scene is visualized with 60 FPS, then delay between two frames is 16.7 ms. It is obvious, that Verse protocol has high chance to resend lost packet just in time. If TCP was used on transport layer, then the packet loss would be solved very ineffectively from our point of view. If the packet 34 was lost, then processing of all following packets would be suspended until content of the packet 34 would be delivered. Such behavior had negative effect on fluency of particle movements in tests of TCP protocol. The real Verse protocol is more complicated, then example described above. Verse uses two types of packets. Payload packets contain payload data. Acknowledgment packets contain acknowledgments of payloads packets. Each payload packet has unique ID (Payload ID). A sender increments the counter of sent packets every time it sends a payload packet. When the counter reaches value 2 32, then the counter is reset to zero value. When payload packet is received, then receiver sends an acknowledgment packet to the sender. This acknowledgment packet has unique ID (AckNak ID) and it contains at least one message with the acknowledgment of the received payload packet. This packet could contain more acknowledgment messages (will be described later). The uniqueness of AckNak ID is guaranteed by the same mechanism as in the case of Payload ID. The receiver should send at least one acknowledgment packet for two received payload packets. The receiver should decrease or increase the ratio of acknowledgment packets, when sender detects acknowledgment packet loss. Thus the sender negotiate the ratio of acknowledgment packets. Negative acknowledgment informs the sender, that one ore more packets were lost. The receiver detects packet loss, when expects receiving of payload packet with ID = N, but payload packet with ID > N is received. The host sends an acknowledgment packet containing all the ACK and NAK messages from the previous acknowledgment packets and following sequence: nak N,,nak ID 1,ack ID (3) When delayed packets (considered as lost) are received, then it is possible to process non-obsolete data from these packets, but it is easier to drop them. Delivery of acknowledgment packet is uncertain, because an unreliable datagram protocol on the transport layer is used. Therefore, probability of delivery of an acknowledge packet to other side must be maximized. All the ACK and NAK messages from previous acknowledgment packets are added to further packets, including payload packets. It is clear, that adding the ACK and NAK messages to packets should be limited somehow. The ACK and NAK messages could not be added to the packet infinitely, because traffic with low packet loss and high delay could produce long sequence of ACK and NAK messages. In this manner ACK and NAK messages would fill the whole packet in a short time. To avoid infinite increase of the ACK and NAK messages, acknowledgment of acknowledgment has to be added to the Verse resend mechanism. The ID of the last acknowledged payload packet is added to the packet sent to the peer. This ID is called Ank ID. When the receiver receives such packet, then it is necessary to send only ACK and NAK messages for payload packets greater than Ank ID. The sender sends packets with the Ank ID until a newer acknowledgment packet is received. The next mechanism of limiting sequence of ACK and NAK messages is compression of this sequence. Let's consider the following sequence of ACK and NAK messages: ack 31, ack 32,nak 33, nak 34, (4) nak 35, ack 36,ack 37, ack 38 Such sequence could be split into the several subsequences containing only ACK messages: AckSeq i ={ack 0 N i,, ack ni N i n i } (5) and NAK messages: WSCG 2011 Communication Papers 34

5 NakSeq i ={nak 0 N i,, nak ni N i n i } (6) where n i+1 is the number of ACK or NAK messages in each subsequence. Because numbers of received payload packets are constantly increasing, then original sequence could be compressed to the following sequence: ack 31,nak 33,ack 36,ack 38 (7) in general m subsequences could be compressed to the following sequence: ack 0 N 0,nak 0 N 1,ack 0 N 2, (8),ack 0 N m 1,ack nm 1 N m 1 n m 1 It is necessary to send an empty payload packet every 2 seconds to the receiver, when there is no payload data to send. It is used for computing current RTT. Empty payload packets also work as a keep alive packets. When the host does not receive any packet from its peer during 30 seconds, then this connection is considered as closed. Tests of Verse protocol The Verse protocol was tested in similar client-server application where transport protocols were tested. The Verse server run again on virtualized OS. Position of moving particles were sent to the Verse server from special Verse client running on the same virtualized OS. When the Verse server received positions of particles, then it tried to send these positions to the second Verse client running at host OS. The link between host and virtualized OS was modified in the same way as it is described in section 2. We can see at Fig. 8 that average delay of Verse protocol was comparable with average delay of UDP. The congestion was longer and delay was bigger than with UDP, because messages containing position of particles are not so simple as messages used for tests of transport protocols. It is price for flexibility and partial reliability of Verse protocol. 6. RELATED WORK Work of Terrence L. Disz et. al. [DPPS95] contains first experiments with CAVE to CAVE communication. They proposed very ambitious plans of object sharing, but it was only plan and this project was canceled. Chen-Chi Chet et. al. [WCC+ 09] proposed Game Transport Protocol (GTP) with 4 schemes of re-transmission, but every type of retransmission scheme can re-transmit whole packet. This approach is very similar to SCTP protocol and it s inefficiency for ASVR was proved. Harcsik et. al. [HPG07] tested transport protocol and its efficiency for network games. These test were specific for network games using thin streams they consists of small packets sent at low packets rates. 7. CONCLUSION AND FUTURE WORK Sharing of 3D data over lossy networks is quite challenging problem. UDP, TCP, SCTP and DCCP transport protocols were tested and compared in special client-server application. It was proved that no transport protocol as is can guarantee low delays together with reliable or semi-reliable transport. Basic principles of new Verse protocol were introduced. This protocol was also tested in the client-server application. Proposed approach used in Verse protocol gave significantly better results for ASVR than simple ad-hoc solutions based on transport protocols, because Verse resend mechanism re-sends only actual data and obsolete data are dropped. New Verse protocol allows to use compression and thus further minimize congestion and delays. Future work will be focused on design and implementation of reliable congestion control for datagram transport varying packet size with fixed sending rate of packets. Next target will be implementation of prioritization, queueing and scheduling of data, that are going to be sent to the receiver. In this way it will be able to increase probability of delivering data with high priority. 8. ACKNOWLEDGMENTS This research is realized under the state subsidy of the Czech Republic within the research and development Advanced Remediation Technologies and Processes Center 1M0554 Program of Research Centers PP2-DP01 supported by Ministry of Education. I would like to thanks to Pavel Satrapa and David Kmoch for useful suggestions and careful reading of this paper. 9. REFERENCES [ARA04] Al-Regib, G. Altunbasak, Y. 3TP: 3-D models transport protocol. In Web3D 04: Proceedings of the ninth international conference on 3D Web technology, pages , New York, NY, USA, ACM. [DPPS95] Disz, T.L. Papka, M.E. Pellegrino, M. Stevens, R. Sharing Visualization Experiences among Remote Virtual Environments. In International Workshop on High Performance Computing for Computer Graphics and Visualization, pages Springer-Verlag, [KHF06] Kohler, E. Handley, M. Floyd, S. Designing DCCP: congestion control without reliability. In SIGCOMM 06: Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications, pages 27 38, New York, NY, USA, ACM. WSCG 2011 Communication Papers 35

6 [KCJ07] Kempf, J., Chander, A., and Jo, M. Optimizing avatar environmental update in shared virtual reality environments. In Proceedings of the First International Conference on Immersive Telecommunications (ICST, Brussels, Belgium, Belgium, 2007), ImmersCom 07, ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering), pp [Hem05] Hemminger, S. Network Emulation with NetEm. In Linux Conf Au, April [HPG07] Harcsik, S., Petlund, A., Griwodz, C., and Halvorsen, P. Latency evaluation of networking mechanisms for game traffic. In Proceedings of the 6th ACM SIGCOMM workshop on Network and system support for games (New York, NY, USA, 2007), NetGames 07, ACM, pp [Pos80] Postel, J. RFC 768: User Datagram Protocol, aug [Pos81] Postel, J. RFC 793: Transmission Control Protocol, sep Updated by RFCs 1122, [BSS06] Brink, E. Steenberg, E. Svenson, G. The Verse Networked 3D Graphics Platform. In SIGRAD 06: Conference proceedings: The Annual SIGRAD conference: Special theme: Computer Games, pages44-48, Skövde, Sweden [SB07] Steenberg, E. Brink, E. The Verse Specification [Ste07] Stewart, R. RFC 4960: Stream Control Transmission Protocol, sep [WCC+09] Wu, C.C. Chen, K.T. Chen, C.M. Huang, P. and Lei, C.L. On the challenge and design of transport protocols for MMORPGs. Multimedia Tools Appl., 45(1-3):7 32, [LG09] Linux Foundation. Networking ToDo List. groups/networking/todo, 2009 Figure 4: Results of experiments with 1000 particles on real WAN network. The link had delay about 5 ms (delay jitter 1 ms) and the bandwidth was about 1900 kb/s. WSCG 2011 Communication Papers 36

7 Figure 5: Test of UDP protocol proofed, that UDP had average delay quite low. Delay between two frames was 40 milliseconds (~25 FPS). Some of particles lost after 100 th frame has never been resend and this packet loss caused inconsistency of data between client and server. Test of TCP protocol proofed, that this transport protocol is not feasible for ASVR. When generated traffic exceeded bandwidth, then delay of received particles grooved to 1 second. Figure 6: Test of semi-reliable variant of SCTP protocol gave similar results as UDP protocol. Average delay was quite low, but lost packets were not resend and it caused inconsistency in data between server and client, when transmission of particles was finished. Test of reliable variant of SCTP protocol. This protocol gave similar results as TCP protocol. When generated traffic exceeded bandwidth of the link between client and server, then delay grooved up to 3 seconds. WSCG 2011 Communication Papers 37

8 Figure 7: Test of Verse protocol has bigger average delay, then UDP or semi-reliable variant of SCTP protocol, because Verse protocol has to transfer more data (header, acknowledgment commands, node commands, etc.). When transferring of particles was finished, then position of all particles was the same at the client and the server. Figure 8: Screenshot of client visualizing delay of received particles. TCP protocol is used in this case. This screenshot was captured during congestion. Thus all received particles are delayed. Red points visualize current received positions and white points visualize expected positions of particles. Colored line between these two points visualize delay of received particle. WSCG 2011 Communication Papers 38

Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation

Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation R.Navaneethakrishnan Assistant Professor (SG) Bharathiyar College of Engineering and Technology, Karaikal, India.

More information

Transport Layer Protocols

Transport Layer Protocols Transport Layer Protocols Version. Transport layer performs two main tasks for the application layer by using the network layer. It provides end to end communication between two applications, and implements

More information

Question: 3 When using Application Intelligence, Server Time may be defined as.

Question: 3 When using Application Intelligence, Server Time may be defined as. 1 Network General - 1T6-521 Application Performance Analysis and Troubleshooting Question: 1 One component in an application turn is. A. Server response time B. Network process time C. Application response

More information

Frequently Asked Questions

Frequently Asked Questions Frequently Asked Questions 1. Q: What is the Network Data Tunnel? A: Network Data Tunnel (NDT) is a software-based solution that accelerates data transfer in point-to-point or point-to-multipoint network

More information

Performance Analysis of IPv4 v/s IPv6 in Virtual Environment Using UBUNTU

Performance Analysis of IPv4 v/s IPv6 in Virtual Environment Using UBUNTU Performance Analysis of IPv4 v/s IPv6 in Virtual Environment Using UBUNTU Savita Shiwani Computer Science,Gyan Vihar University, Rajasthan, India G.N. Purohit AIM & ACT, Banasthali University, Banasthali,

More information

Per-Flow Queuing Allot's Approach to Bandwidth Management

Per-Flow Queuing Allot's Approach to Bandwidth Management White Paper Per-Flow Queuing Allot's Approach to Bandwidth Management Allot Communications, July 2006. All Rights Reserved. Table of Contents Executive Overview... 3 Understanding TCP/IP... 4 What is Bandwidth

More information

TCP Adaptation for MPI on Long-and-Fat Networks

TCP Adaptation for MPI on Long-and-Fat Networks TCP Adaptation for MPI on Long-and-Fat Networks Motohiko Matsuda, Tomohiro Kudoh Yuetsu Kodama, Ryousei Takano Grid Technology Research Center Yutaka Ishikawa The University of Tokyo Outline Background

More information

Applications. Network Application Performance Analysis. Laboratory. Objective. Overview

Applications. Network Application Performance Analysis. Laboratory. Objective. Overview Laboratory 12 Applications Network Application Performance Analysis Objective The objective of this lab is to analyze the performance of an Internet application protocol and its relation to the underlying

More information

Clearing the Way for VoIP

Clearing the Way for VoIP Gen2 Ventures White Paper Clearing the Way for VoIP An Alternative to Expensive WAN Upgrades Executive Overview Enterprises have traditionally maintained separate networks for their voice and data traffic.

More information

Low-rate TCP-targeted Denial of Service Attack Defense

Low-rate TCP-targeted Denial of Service Attack Defense Low-rate TCP-targeted Denial of Service Attack Defense Johnny Tsao Petros Efstathopoulos University of California, Los Angeles, Computer Science Department Los Angeles, CA E-mail: {johnny5t, pefstath}@cs.ucla.edu

More information

Moven Studio realtime. streaming

Moven Studio realtime. streaming Moven Studio realtime network streaming UDP protocol specification Document MV0305P Revision B, 19 December 2007 Xsens Technologies B.V. phone +31 88 XSENS 00 Pantheon 6a +31 88 97367 00 P.O. Box 559 fax

More information

Computer Networks. Chapter 5 Transport Protocols

Computer Networks. Chapter 5 Transport Protocols Computer Networks Chapter 5 Transport Protocols Transport Protocol Provides end-to-end transport Hides the network details Transport protocol or service (TS) offers: Different types of services QoS Data

More information

D. SamKnows Methodology 20 Each deployed Whitebox performs the following tests: Primary measure(s)

D. SamKnows Methodology 20 Each deployed Whitebox performs the following tests: Primary measure(s) v. Test Node Selection Having a geographically diverse set of test nodes would be of little use if the Whiteboxes running the test did not have a suitable mechanism to determine which node was the best

More information

A Passive Method for Estimating End-to-End TCP Packet Loss

A Passive Method for Estimating End-to-End TCP Packet Loss A Passive Method for Estimating End-to-End TCP Packet Loss Peter Benko and Andras Veres Traffic Analysis and Network Performance Laboratory, Ericsson Research, Budapest, Hungary {Peter.Benko, Andras.Veres}@eth.ericsson.se

More information

AN IMPROVED SNOOP FOR TCP RENO AND TCP SACK IN WIRED-CUM- WIRELESS NETWORKS

AN IMPROVED SNOOP FOR TCP RENO AND TCP SACK IN WIRED-CUM- WIRELESS NETWORKS AN IMPROVED SNOOP FOR TCP RENO AND TCP SACK IN WIRED-CUM- WIRELESS NETWORKS Srikanth Tiyyagura Department of Computer Science and Engineering JNTUA College of Engg., pulivendula, Andhra Pradesh, India.

More information

TCP and Wireless Networks Classical Approaches Optimizations TCP for 2.5G/3G Systems. Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme

TCP and Wireless Networks Classical Approaches Optimizations TCP for 2.5G/3G Systems. Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme Chapter 2 Technical Basics: Layer 1 Methods for Medium Access: Layer 2 Chapter 3 Wireless Networks: Bluetooth, WLAN, WirelessMAN, WirelessWAN Mobile Networks: GSM, GPRS, UMTS Chapter 4 Mobility on the

More information

High-Speed TCP Performance Characterization under Various Operating Systems

High-Speed TCP Performance Characterization under Various Operating Systems High-Speed TCP Performance Characterization under Various Operating Systems Y. Iwanaga, K. Kumazoe, D. Cavendish, M.Tsuru and Y. Oie Kyushu Institute of Technology 68-4, Kawazu, Iizuka-shi, Fukuoka, 82-852,

More information

Digital Audio and Video Data

Digital Audio and Video Data Multimedia Networking Reading: Sections 3.1.2, 3.3, 4.5, and 6.5 CS-375: Computer Networks Dr. Thomas C. Bressoud 1 Digital Audio and Video Data 2 Challenges for Media Streaming Large volume of data Each

More information

Influence of Load Balancing on Quality of Real Time Data Transmission*

Influence of Load Balancing on Quality of Real Time Data Transmission* SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol. 6, No. 3, December 2009, 515-524 UDK: 004.738.2 Influence of Load Balancing on Quality of Real Time Data Transmission* Nataša Maksić 1,a, Petar Knežević 2,

More information

Procedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address

Procedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address Objectives University of Jordan Faculty of Engineering & Technology Computer Engineering Department Computer Networks Laboratory 907528 Lab.4 Basic Network Operation and Troubleshooting 1. To become familiar

More information

COMP 3331/9331: Computer Networks and Applications. Lab Exercise 3: TCP and UDP (Solutions)

COMP 3331/9331: Computer Networks and Applications. Lab Exercise 3: TCP and UDP (Solutions) COMP 3331/9331: Computer Networks and Applications Lab Exercise 3: TCP and UDP (Solutions) AIM To investigate the behaviour of TCP and UDP in greater detail. EXPERIMENT 1: Understanding TCP Basics Tools

More information

Adaptive DCF of MAC for VoIP services using IEEE 802.11 networks

Adaptive DCF of MAC for VoIP services using IEEE 802.11 networks Adaptive DCF of MAC for VoIP services using IEEE 802.11 networks 1 Mr. Praveen S Patil, 2 Mr. Rabinarayan Panda, 3 Mr. Sunil Kumar R D 1,2,3 Asst. Professor, Department of MCA, The Oxford College of Engineering,

More information

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Purvi N. Ramanuj Department of Computer Engineering L.D. College of Engineering Ahmedabad Hiteishi M. Diwanji

More information

Measuring IP Performance. Geoff Huston Telstra

Measuring IP Performance. Geoff Huston Telstra Measuring IP Performance Geoff Huston Telstra What are you trying to measure? User experience Responsiveness Sustained Throughput Application performance quality Consistency Availability Network Behaviour

More information

Using TrueSpeed VNF to Test TCP Throughput in a Call Center Environment

Using TrueSpeed VNF to Test TCP Throughput in a Call Center Environment Using TrueSpeed VNF to Test TCP Throughput in a Call Center Environment TrueSpeed VNF provides network operators and enterprise users with repeatable, standards-based testing to resolve complaints about

More information

Final for ECE374 05/06/13 Solution!!

Final for ECE374 05/06/13 Solution!! 1 Final for ECE374 05/06/13 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam taker -

More information

Reliable Multicast Protocol with Packet Forwarding in Wireless Internet

Reliable Multicast Protocol with Packet Forwarding in Wireless Internet Reliable Multicast Protocol with Packet Forwarding in Wireless Internet Taku NOGUCHI, Toru YOSHIKAWA and Miki YAMAMOTO College of Information Science and Engineering, Ritsumeikan University 1-1-1, Nojihigashi,

More information

Performance Comparison of SCTP and TCP over Linux Platform

Performance Comparison of SCTP and TCP over Linux Platform Performance Comparison of SCTP and TCP over Linux Platform Jong-Shik Ha, Sang-Tae Kim, and Seok J. Koh Department of Computer Science, Kyungpook National University, Korea {mugal1, saintpaul1978, sjkoh}@cs.knu.ac.kr

More information

Performance measurements of STANAG 5066 and Applications Running over STANAG 5066

Performance measurements of STANAG 5066 and Applications Running over STANAG 5066 Performance measurements of STANAG 5066 and Applications Running over STANAG 5066 Steve Kille CEO September 14 th 2009 Why Measure? The End Goal is to run Applications and Services over HF Radio Maximize

More information

Application Level Congestion Control Enhancements in High BDP Networks. Anupama Sundaresan

Application Level Congestion Control Enhancements in High BDP Networks. Anupama Sundaresan Application Level Congestion Control Enhancements in High BDP Networks Anupama Sundaresan Organization Introduction Motivation Implementation Experiments and Results Conclusions 2 Developing a Grid service

More information

Visualizations and Correlations in Troubleshooting

Visualizations and Correlations in Troubleshooting Visualizations and Correlations in Troubleshooting Kevin Burns Comcast kevin_burns@cable.comcast.com 1 Comcast Technology Groups Cable CMTS, Modem, Edge Services Backbone Transport, Routing Converged Regional

More information

PORTrockIT. Spectrum Protect : faster WAN replication and backups with PORTrockIT

PORTrockIT. Spectrum Protect : faster WAN replication and backups with PORTrockIT 1 PORTrockIT 2 Executive summary IBM Spectrum Protect, previously known as IBM Tivoli Storage Manager or TSM, is the cornerstone of many large companies data protection strategies, offering a wide range

More information

HOW PUBLIC INTERNET IS FINALLY READY FOR HD VIDEO BACKHAUL

HOW PUBLIC INTERNET IS FINALLY READY FOR HD VIDEO BACKHAUL White Paper HOW PUBLIC INTERNET IS FINALLY READY FOR HD VIDEO BACKHAUL EXPLORING THE CHALLENGES AND OPPORTUNITIES OF DELIVERING MORE CONTENT AT LESS COST Today s broadcasters are faced with an ever- present

More information

Congestions and Control Mechanisms n Wired and Wireless Networks

Congestions and Control Mechanisms n Wired and Wireless Networks International OPEN ACCESS Journal ISSN: 2249-6645 Of Modern Engineering Research (IJMER) Congestions and Control Mechanisms n Wired and Wireless Networks MD Gulzar 1, B Mahender 2, Mr.B.Buchibabu 3 1 (Asst

More information

TCP loss sensitivity analysis ADAM KRAJEWSKI, IT-CS-CE

TCP loss sensitivity analysis ADAM KRAJEWSKI, IT-CS-CE TCP loss sensitivity analysis ADAM KRAJEWSKI, IT-CS-CE Original problem IT-DB was backuping some data to Wigner CC. High transfer rate was required in order to avoid service degradation. 4G out of... 10G

More information

Access-Controlled Video/Voice over IP in Hadoop System with BPNN Intelligent Adaptation

Access-Controlled Video/Voice over IP in Hadoop System with BPNN Intelligent Adaptation Access-Controlled Video/Voice over IP in Hadoop System with BPNN Intelligent Adaptation Authors: Speaker : 童 耀 民 MA1G0222 2013.05.07 1 Outline INTRODUCTION VIDEO/VOICE OVER IP ON CLOUD COMPUTING REALIZATION

More information

APPENDIX 1 USER LEVEL IMPLEMENTATION OF PPATPAN IN LINUX SYSTEM

APPENDIX 1 USER LEVEL IMPLEMENTATION OF PPATPAN IN LINUX SYSTEM 152 APPENDIX 1 USER LEVEL IMPLEMENTATION OF PPATPAN IN LINUX SYSTEM A1.1 INTRODUCTION PPATPAN is implemented in a test bed with five Linux system arranged in a multihop topology. The system is implemented

More information

EFFECT OF TRANSFER FILE SIZE ON TCP-ADaLR PERFORMANCE: A SIMULATION STUDY

EFFECT OF TRANSFER FILE SIZE ON TCP-ADaLR PERFORMANCE: A SIMULATION STUDY EFFECT OF TRANSFER FILE SIZE ON PERFORMANCE: A SIMULATION STUDY Modupe Omueti and Ljiljana Trajković Simon Fraser University Vancouver British Columbia Canada {momueti, ljilja}@cs.sfu.ca ABSTRACT Large

More information

CHAPTER 1 PRINCIPLES OF NETWORK MONITORING

CHAPTER 1 PRINCIPLES OF NETWORK MONITORING CHAPTER 1 PRINCIPLES OF NETWORK MONITORING Jawwad Shamsi and Monica Brocmeyer Department of Computer Science, Wayne State University 5143 Cass Avenue, 431 State Hall, Detroit, MI 48202, USA E-mail:{ jshamsi,

More information

Solving complex performance problems in TCP/IP and SNA environments.

Solving complex performance problems in TCP/IP and SNA environments. IBM Global Services Solving complex performance problems in TCP/IP and SNA environments. Key Topics Discusses how performance analysis of networks relates to key issues in today's business environment

More information

Midterm Exam CMPSCI 453: Computer Networks Fall 2011 Prof. Jim Kurose

Midterm Exam CMPSCI 453: Computer Networks Fall 2011 Prof. Jim Kurose Midterm Exam CMPSCI 453: Computer Networks Fall 2011 Prof. Jim Kurose Instructions: There are 4 questions on this exam. Please use two exam blue books answer questions 1, 2 in one book, and the remaining

More information

Syslog Performance: Data Modeling and Transport

Syslog Performance: Data Modeling and Transport Syslog Performance: Data Modeling and Transport Mohammad Rajiullah, Reine Lundin, Anna Brunstrom, and Stefan Lindskog Department of Computer Science, Karlstad University SE-65 88 Karlstad, Sweden Email:

More information

High-Speed Thin Client Technology for Mobile Environment: Mobile RVEC

High-Speed Thin Client Technology for Mobile Environment: Mobile RVEC High-Speed Thin Client Technology for Mobile Environment: Mobile RVEC Masahiro Matsuda Kazuki Matsui Yuichi Sato Hiroaki Kameyama Thin client systems on smart devices have been attracting interest from

More information

1. The subnet must prevent additional packets from entering the congested region until those already present can be processed.

1. The subnet must prevent additional packets from entering the congested region until those already present can be processed. Congestion Control When one part of the subnet (e.g. one or more routers in an area) becomes overloaded, congestion results. Because routers are receiving packets faster than they can forward them, one

More information

Handover Management based on the Number of Retries for VoIP on WLANs

Handover Management based on the Number of Retries for VoIP on WLANs Handover Management based on the Number of Retries for VoIP on WLANs Shigeru Kashihara Yuji Oie Department of Computer Science and Electronics, Kyushu Institute of Technology Kawazu 68-4, Iizuka, 82-852

More information

Advanced Computer Networks Project 2: File Transfer Application

Advanced Computer Networks Project 2: File Transfer Application 1 Overview Advanced Computer Networks Project 2: File Transfer Application Assigned: April 25, 2014 Due: May 30, 2014 In this assignment, you will implement a file transfer application. The application

More information

Requirements of Voice in an IP Internetwork

Requirements of Voice in an IP Internetwork Requirements of Voice in an IP Internetwork Real-Time Voice in a Best-Effort IP Internetwork This topic lists problems associated with implementation of real-time voice traffic in a best-effort IP internetwork.

More information

Mobile Communications Chapter 9: Mobile Transport Layer

Mobile Communications Chapter 9: Mobile Transport Layer Mobile Communications Chapter 9: Mobile Transport Layer Motivation TCP-mechanisms Classical approaches Indirect TCP Snooping TCP Mobile TCP PEPs in general Additional optimizations Fast retransmit/recovery

More information

An Introduction to VoIP Protocols

An Introduction to VoIP Protocols An Introduction to VoIP Protocols www.netqos.com Voice over IP (VoIP) offers the vision of a converged network carrying multiple types of traffic (voice, video, and data, to name a few). To carry out this

More information

Comparative Analysis of Congestion Control Algorithms Using ns-2

Comparative Analysis of Congestion Control Algorithms Using ns-2 www.ijcsi.org 89 Comparative Analysis of Congestion Control Algorithms Using ns-2 Sanjeev Patel 1, P. K. Gupta 2, Arjun Garg 3, Prateek Mehrotra 4 and Manish Chhabra 5 1 Deptt. of Computer Sc. & Engg,

More information

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc (International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan dr.khalidbilal@hotmail.com

More information

How To Analyze The Security On An Ipa Wireless Sensor Network

How To Analyze The Security On An Ipa Wireless Sensor Network Throughput Analysis of WEP Security in Ad Hoc Sensor Networks Mohammad Saleh and Iyad Al Khatib iitc Stockholm, Sweden {mohsaleh, iyad}@iitc.se ABSTRACT This paper presents a performance investigation

More information

Comparisons of SDN OpenFlow Controllers over EstiNet: Ryu vs. NOX

Comparisons of SDN OpenFlow Controllers over EstiNet: Ryu vs. NOX Comparisons of SDN OpenFlow Controllers over EstiNet: Ryu vs. NOX Shie-Yuan Wang Hung-Wei Chiu and Chih-Liang Chou Department of Computer Science, National Chiao Tung University, Taiwan Email: shieyuan@cs.nctu.edu.tw

More information

NETWORK LAYER/INTERNET PROTOCOLS

NETWORK LAYER/INTERNET PROTOCOLS CHAPTER 3 NETWORK LAYER/INTERNET PROTOCOLS You will learn about the following in this chapter: IP operation, fields and functions ICMP messages and meanings Fragmentation and reassembly of datagrams IP

More information

MOBILITY AND MOBILE NETWORK OPTIMIZATION

MOBILITY AND MOBILE NETWORK OPTIMIZATION MOBILITY AND MOBILE NETWORK OPTIMIZATION netmotionwireless.com Executive Summary Wireless networks exhibit uneven and unpredictable performance characteristics which, if not correctly managed, can turn

More information

VoIP network planning guide

VoIP network planning guide VoIP network planning guide Document Reference: Volker Schüppel 08.12.2009 1 CONTENT 1 CONTENT... 2 2 SCOPE... 3 3 BANDWIDTH... 4 3.1 Control data 4 3.2 Audio codec 5 3.3 Packet size and protocol overhead

More information

Key Components of WAN Optimization Controller Functionality

Key Components of WAN Optimization Controller Functionality Key Components of WAN Optimization Controller Functionality Introduction and Goals One of the key challenges facing IT organizations relative to application and service delivery is ensuring that the applications

More information

CREW - FP7 - GA No. 258301. Cognitive Radio Experimentation World. Project Deliverable D7.5.4 Showcase of experiment ready (Demonstrator)

CREW - FP7 - GA No. 258301. Cognitive Radio Experimentation World. Project Deliverable D7.5.4 Showcase of experiment ready (Demonstrator) Cognitive Radio Experimentation World!"#$% Project Deliverable Showcase of experiment ready (Demonstrator) Contractual date of delivery: 31-03-14 Actual date of delivery: 18-04-14 Beneficiaries: Lead beneficiary:

More information

packet retransmitting based on dynamic route table technology, as shown in fig. 2 and 3.

packet retransmitting based on dynamic route table technology, as shown in fig. 2 and 3. Implementation of an Emulation Environment for Large Scale Network Security Experiments Cui Yimin, Liu Li, Jin Qi, Kuang Xiaohui National Key Laboratory of Science and Technology on Information System

More information

Outline. TCP connection setup/data transfer. 15-441 Computer Networking. TCP Reliability. Congestion sources and collapse. Congestion control basics

Outline. TCP connection setup/data transfer. 15-441 Computer Networking. TCP Reliability. Congestion sources and collapse. Congestion control basics Outline 15-441 Computer Networking Lecture 8 TCP & Congestion Control TCP connection setup/data transfer TCP Reliability Congestion sources and collapse Congestion control basics Lecture 8: 09-23-2002

More information

Application Note. Windows 2000/XP TCP Tuning for High Bandwidth Networks. mguard smart mguard PCI mguard blade

Application Note. Windows 2000/XP TCP Tuning for High Bandwidth Networks. mguard smart mguard PCI mguard blade Application Note Windows 2000/XP TCP Tuning for High Bandwidth Networks mguard smart mguard PCI mguard blade mguard industrial mguard delta Innominate Security Technologies AG Albert-Einstein-Str. 14 12489

More information

Student, Haryana Engineering College, Haryana, India 2 H.O.D (CSE), Haryana Engineering College, Haryana, India

Student, Haryana Engineering College, Haryana, India 2 H.O.D (CSE), Haryana Engineering College, Haryana, India Volume 5, Issue 6, June 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A New Protocol

More information

TCP, Active Queue Management and QoS

TCP, Active Queue Management and QoS TCP, Active Queue Management and QoS Don Towsley UMass Amherst towsley@cs.umass.edu Collaborators: W. Gong, C. Hollot, V. Misra Outline motivation TCP friendliness/fairness bottleneck invariant principle

More information

Getting Started with. Avaya TM VoIP Monitoring Manager

Getting Started with. Avaya TM VoIP Monitoring Manager Getting Started with Avaya TM VoIP Monitoring Manager Contents AvayaTM VoIP Monitoring Manager 5 About This Guide 5 What is VoIP Monitoring Manager 5 Query Endpoints 5 Customize Query to Filter Based

More information

Encapsulating Voice in IP Packets

Encapsulating Voice in IP Packets Encapsulating Voice in IP Packets Major VoIP Protocols This topic defines the major VoIP protocols and matches them with the seven layers of the OSI model. Major VoIP Protocols 15 The major VoIP protocols

More information

Networking Test 4 Study Guide

Networking Test 4 Study Guide Networking Test 4 Study Guide True/False Indicate whether the statement is true or false. 1. IPX/SPX is considered the protocol suite of the Internet, and it is the most widely used protocol suite in LANs.

More information

ICOM 5026-090: Computer Networks Chapter 6: The Transport Layer. By Dr Yi Qian Department of Electronic and Computer Engineering Fall 2006 UPRM

ICOM 5026-090: Computer Networks Chapter 6: The Transport Layer. By Dr Yi Qian Department of Electronic and Computer Engineering Fall 2006 UPRM ICOM 5026-090: Computer Networks Chapter 6: The Transport Layer By Dr Yi Qian Department of Electronic and Computer Engineering Fall 2006 Outline The transport service Elements of transport protocols A

More information

B-2 Analyzing TCP/IP Networks with Wireshark. Ray Tompkins Founder of Gearbit www.gearbit.com

B-2 Analyzing TCP/IP Networks with Wireshark. Ray Tompkins Founder of Gearbit www.gearbit.com B-2 Analyzing TCP/IP Networks with Wireshark June 15, 2010 Ray Tompkins Founder of Gearbit www.gearbit.com SHARKFEST 10 Stanford University June 14-17, 2010 TCP In this session we will examine the details

More information

THE IMPORTANCE OF TESTING TCP PERFORMANCE IN CARRIER ETHERNET NETWORKS

THE IMPORTANCE OF TESTING TCP PERFORMANCE IN CARRIER ETHERNET NETWORKS THE IMPORTANCE OF TESTING TCP PERFORMANCE IN CARRIER ETHERNET NETWORKS 159 APPLICATION NOTE Bruno Giguère, Member of Technical Staff, Transport & Datacom Business Unit, EXFO As end-users are migrating

More information

TCP/IP Optimization for Wide Area Storage Networks. Dr. Joseph L White Juniper Networks

TCP/IP Optimization for Wide Area Storage Networks. Dr. Joseph L White Juniper Networks TCP/IP Optimization for Wide Area Storage Networks Dr. Joseph L White Juniper Networks SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individuals

More information

Burst Testing. New mobility standards and cloud-computing network. This application note will describe how TCP creates bursty

Burst Testing. New mobility standards and cloud-computing network. This application note will describe how TCP creates bursty Burst Testing Emerging high-speed protocols in mobility and access networks, combined with qualityof-service demands from business customers for services such as cloud computing, place increased performance

More information

Secure SCTP against DoS Attacks in Wireless Internet

Secure SCTP against DoS Attacks in Wireless Internet Secure SCTP against DoS Attacks in Wireless Internet Inwhee Joe College of Information and Communications Hanyang University Seoul, Korea iwjoe@hanyang.ac.kr Abstract. The Stream Control Transport Protocol

More information

A Survey: High Speed TCP Variants in Wireless Networks

A Survey: High Speed TCP Variants in Wireless Networks ISSN: 2321-7782 (Online) Volume 1, Issue 7, December 2013 International Journal of Advance Research in Computer Science and Management Studies Research Paper Available online at: www.ijarcsms.com A Survey:

More information

Networking part 3: the transport layer

Networking part 3: the transport layer Networking part 3: the transport layer Juliusz Chroboczek Université de Paris-Diderot (Paris 7) September 2011 Summary of the previous episodes Episode 1: switching, packet switching and the Internet.

More information

Introduction VOIP in an 802.11 Network VOIP 3

Introduction VOIP in an 802.11 Network VOIP 3 Solutions to Performance Problems in VOIP over 802.11 Wireless LAN Wei Wang, Soung C. Liew Presented By Syed Zaidi 1 Outline Introduction VOIP background Problems faced in 802.11 Low VOIP capacity in 802.11

More information

Internet Protocol: IP packet headers. vendredi 18 octobre 13

Internet Protocol: IP packet headers. vendredi 18 octobre 13 Internet Protocol: IP packet headers 1 IPv4 header V L TOS Total Length Identification F Frag TTL Proto Checksum Options Source address Destination address Data (payload) Padding V: Version (IPv4 ; IPv6)

More information

2.1 Introduction. 2.2 Voice over IP (VoIP)

2.1 Introduction. 2.2 Voice over IP (VoIP) 2.1 Introduction In this section can provide the necessary background on the structure of VoIP applications and on their component, and the transmission protocols generally used in VoIP. 2.2 Voice over

More information

First Midterm for ECE374 03/24/11 Solution!!

First Midterm for ECE374 03/24/11 Solution!! 1 First Midterm for ECE374 03/24/11 Solution!! Note: In all written assignments, please show as much of your work as you can. Even if you get a wrong answer, you can get partial credit if you show your

More information

Parallel TCP Data Transfers: A Practical Model and its Application

Parallel TCP Data Transfers: A Practical Model and its Application D r a g a n a D a m j a n o v i ć Parallel TCP Data Transfers: A Practical Model and its Application s u b m i t t e d t o the Faculty of Mathematics, Computer Science and Physics, the University of Innsbruck

More information

STANDPOINT FOR QUALITY-OF-SERVICE MEASUREMENT

STANDPOINT FOR QUALITY-OF-SERVICE MEASUREMENT STANDPOINT FOR QUALITY-OF-SERVICE MEASUREMENT 1. TIMING ACCURACY The accurate multi-point measurements require accurate synchronization of clocks of the measurement devices. If for example time stamps

More information

Smart Queue Scheduling for QoS Spring 2001 Final Report

Smart Queue Scheduling for QoS Spring 2001 Final Report ENSC 833-3: NETWORK PROTOCOLS AND PERFORMANCE CMPT 885-3: SPECIAL TOPICS: HIGH-PERFORMANCE NETWORKS Smart Queue Scheduling for QoS Spring 2001 Final Report By Haijing Fang(hfanga@sfu.ca) & Liu Tang(llt@sfu.ca)

More information

4 High-speed Transmission and Interoperability

4 High-speed Transmission and Interoperability 4 High-speed Transmission and Interoperability Technology 4-1 Transport Protocols for Fast Long-Distance Networks: Comparison of Their Performances in JGN KUMAZOE Kazumi, KOUYAMA Katsushi, HORI Yoshiaki,

More information

MONITORING OF TRAFFIC OVER THE VICTIM UNDER TCP SYN FLOOD IN A LAN

MONITORING OF TRAFFIC OVER THE VICTIM UNDER TCP SYN FLOOD IN A LAN MONITORING OF TRAFFIC OVER THE VICTIM UNDER TCP SYN FLOOD IN A LAN Kanika 1, Renuka Goyal 2, Gurmeet Kaur 3 1 M.Tech Scholar, Computer Science and Technology, Central University of Punjab, Punjab, India

More information

Applying Active Queue Management to Link Layer Buffers for Real-time Traffic over Third Generation Wireless Networks

Applying Active Queue Management to Link Layer Buffers for Real-time Traffic over Third Generation Wireless Networks Applying Active Queue Management to Link Layer Buffers for Real-time Traffic over Third Generation Wireless Networks Jian Chen and Victor C.M. Leung Department of Electrical and Computer Engineering The

More information

CSE 123: Computer Networks

CSE 123: Computer Networks CSE 123: Computer Networks Homework 4 Solutions Out: 12/03 Due: 12/10 1. Routers and QoS Packet # Size Flow 1 100 1 2 110 1 3 50 1 4 160 2 5 80 2 6 240 2 7 90 3 8 180 3 Suppose a router has three input

More information

VRT Testing What Makes BullsEye Better and Different from the rest (Our competitive Advantage)

VRT Testing What Makes BullsEye Better and Different from the rest (Our competitive Advantage) VRT Testing What Makes BullsEye Better and Different from the rest (Our competitive Advantage) December 16 th, 2015 Table of Contents 1. Purpose... 3 2. What a typical internet speed test measures....

More information

Seamless Congestion Control over Wired and Wireless IEEE 802.11 Networks

Seamless Congestion Control over Wired and Wireless IEEE 802.11 Networks Seamless Congestion Control over Wired and Wireless IEEE 802.11 Networks Vasilios A. Siris and Despina Triantafyllidou Institute of Computer Science (ICS) Foundation for Research and Technology - Hellas

More information

WAN Performance Analysis A Study on the Impact of Windows 7

WAN Performance Analysis A Study on the Impact of Windows 7 A Talari Networks White Paper WAN Performance Analysis A Study on the Impact of Windows 7 Test results demonstrating WAN performance changes due to upgrading to Windows 7 and the network architecture and

More information

Performance Analysis of Video Calls Using Skype

Performance Analysis of Video Calls Using Skype Section 3 Network Systems Engineering Abstract Performance Analysis of Video Calls Using Skype A. Asiri and L. Sun Centre for Security, Communications and Network Research Plymouth University, United Kingdom

More information

Final Exam. Route Computation: One reason why link state routing is preferable to distance vector style routing.

Final Exam. Route Computation: One reason why link state routing is preferable to distance vector style routing. UCSD CSE CS 123 Final Exam Computer Networks Directions: Write your name on the exam. Write something for every question. You will get some points if you attempt a solution but nothing for a blank sheet

More information

Mathematical Modelling of Computer Networks: Part II. Module 1: Network Coding

Mathematical Modelling of Computer Networks: Part II. Module 1: Network Coding Mathematical Modelling of Computer Networks: Part II Module 1: Network Coding Lecture 3: Network coding and TCP 12th November 2013 Laila Daniel and Krishnan Narayanan Dept. of Computer Science, University

More information

IP - The Internet Protocol

IP - The Internet Protocol Orientation IP - The Internet Protocol IP (Internet Protocol) is a Network Layer Protocol. IP s current version is Version 4 (IPv4). It is specified in RFC 891. TCP UDP Transport Layer ICMP IP IGMP Network

More information

TCP performance optimization for handover Management for LTE satellite/terrestrial hybrid. network.

TCP performance optimization for handover Management for LTE satellite/terrestrial hybrid. network. TCP performance optimization for handover Management for LTE satellite/terrestrial hybrid networks Michael Crosnier, Riadh Dhaou, Fabrice Planchou and Andre-Luc Beylot Astrium, 31 avenue des cosmonautes,

More information

Performance analysis and comparison of virtualization protocols, RDP and PCoIP

Performance analysis and comparison of virtualization protocols, RDP and PCoIP Performance analysis and comparison of virtualization protocols, RDP and PCoIP Jiri Kouril, Petra Lambertova Department of Telecommunications Brno University of Technology Ustav telekomunikaci, Purkynova

More information

TCP over Wireless Networks

TCP over Wireless Networks TCP over Wireless Networks Raj Jain Professor of Computer Science and Engineering Washington University in Saint Louis Saint Louis, MO 63130 Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse574-10/

More information

A Resilient Transport Layer for Messaging Systems

A Resilient Transport Layer for Messaging Systems Master's Thesis A Resilient Transport Layer for Messaging Systems September 14, 2007 1 Supervision: Dr. Sean Rooney (IBM Research GmbH, Zurich Research Laboratory) Prof. Dr. Gustavo Alonso (ETH Zurich,

More information

[Prof. Rupesh G Vaishnav] Page 1

[Prof. Rupesh G Vaishnav] Page 1 Basics The function of transport layer is to provide a reliable end-to-end communications service. It also provides data transfer service for the user layers above and shield the upper layers from the

More information

Application Layer. CMPT371 12-1 Application Layer 1. Required Reading: Chapter 2 of the text book. Outline of Chapter 2

Application Layer. CMPT371 12-1 Application Layer 1. Required Reading: Chapter 2 of the text book. Outline of Chapter 2 CMPT371 12-1 Application Layer 1 Application Layer Required Reading: Chapter 2 of the text book. Outline of Chapter 2 Network applications HTTP, protocol for web application FTP, file transfer protocol

More information

HyperIP : VERITAS Replication Application Note

HyperIP : VERITAS Replication Application Note QuickTime and a Graphics decompressor are needed to see this picture. HyperIP : VERITAS Replication Application Note Introduction HyperIP is a Linux software application that quantifiably and measurably

More information

Adopting SCTP and MPLS-TE Mechanism in VoIP Architecture for Fault Recovery and Resource Allocation

Adopting SCTP and MPLS-TE Mechanism in VoIP Architecture for Fault Recovery and Resource Allocation Adopting SCTP and MPLS-TE Mechanism in VoIP Architecture for Fault Recovery and Resource Allocation Fu-Min Chang #1, I-Ping Hsieh 2, Shang-Juh Kao 3 # Department of Finance, Chaoyang University of Technology

More information